DNS as Hide Gate in IA Sandboxes that Open Doors to Exfiltration and Remote Control

Published 5 min de lectura 104 reading

In recent weeks, security around the platforms that run code for artificial intelligence agents has turned the alarms on again. Cybersecurity researchers have described a technique that can extract sensitive information by taking advantage of Domain Name System (DNS) consultations from environments that, on paper, should be isolated. The report published by BeyondTrust details how the sandbox mode of the Amazon Bedrock AgentCore Code Interpreter allows you to solve DNS to the outside, which can open control and control channels and exfiltration routes even when the configuration indicates "without network access."

The vector is surprisingly simple in its idea: if a sandbox environment can issue DNS consultations to domains controlled by an attacker, these requests can become two-way messages. In practice, researchers managed to mount an interactive communication that allows sending commands and receiving responses using DNS records, obtain an interactive reverse shell and filter data stored in AWS services - for example, in S3 buckets - provided that the IAM role associated with the code interpreter has excessive permissions. Beyond the extraction, the mechanism can serve to deliver loads that the Code Interpreter itself downloads and runs by consulting instructions stored in A records of a malicious DNS server.

DNS as Hide Gate in IA Sandboxes that Open Doors to Exfiltration and Remote Control
Image generated with IA.

The finding is pointed out as a serious problem: although at the time of writing it has no CVE identifier, BeyondTrust assigned a severity that arouses attention. Amazon, for its part, after the responsible disclosure in September 2025, has defined this behavior as intended functionality and recommends migrating critical loads to VPC mode to achieve true network isolation. Your blog and documentation explains the nature of the service and the deployment options; for example, you can see the official introduction to the Code Interpreter in the AWS blog Amazon Bedrock AgentCore Code Interpreter and the technical guide in official documentation from AWS. For those seeking complete isolation, AWS aims to operate within a VPC and to use a DNS firewall to block unwanted resolutions; a useful reference to that protection is the article on Route 53 Resolver DNS Firewall.

This incident illustrates a recurring pattern: the combination of execution of dynamic code (specific to the IA agents) and poorly calibrated permissions can multiply the damage. If a service that runs code has assigned a too permissive role, the value of each malicious DNS query increases, because the attacker could, for example, ask the interpreter to read resources to which that role has access and return that information through subdomains. The immediate practical recommendation that many experts repeat is to review and limit the IAM roles associated with these services, implementing the principle of less privilege and migrating sensitive instances to environments with more stringent network rules.

This wave of warnings is not alone. In parallel to Bedrock research, other platforms and libraries of the IA ecosystem have shown serious vulnerabilities. The LangSmith observability platform suffered a failure that allowed an attacker to steal tokens and be made with user accounts by handling a URL parameter; that problem received the designation CVE-2026-25750 and was corrected in version 0.12.71, as described by the discoverers in their analysis Miggo Security. The risk was that with a committed token an attacker can review the track history of the IA and recover calls to tools containing internal queries, CRM records or private code fragments.

Another set of worrying vulnerabilities affects SGLang, an open-source framework to serve language and multimodal models. Orca researchers described unsafe deserialization failures with pickle that, in specific scenarios, allow remote code execution without authentication. The problems get public identity in the CVE records as CVE-2026-3059, CVE-2026-3060 and CVE-2026-3989, and Orca published a technical analysis that deserves to be read calmly Here.. CERT / CC also issued a coordinated warning indicating that when certain modules are active and exposed to the network, an attacker can send malicious pickle files to the ZeroMQ broker and cause the deserialization of unreliable data according to the notice.

DNS as Hide Gate in IA Sandboxes that Open Doors to Exfiltration and Remote Control
Image generated with IA.

The lessons are clear and applicable to organizations of any size: the execution environments of agents and models are already part of the backbone of many operations, and should therefore be treated as critical infrastructure. Migrating sensitive loads to virtual private networks and strengthening DNS controls reduces the risk surface, but does not replace the need to audit permissions, review default settings and update quickly when a patch is published. Also, exposing ZeroMQ interfaces or similar to unreliable networks is an invitation to risk; these doors must be closed by segmentation and rules that limit access to specific hosts and ports.

From an operational perspective, it is appropriate to implement dedicated monitoring: alerts for processes that open unusual outgoing connections, for creating files on foreign routes or for DNS traffic to unusual domains. In the case of LangSmith the immediate action was to update to a corrected version; in the case of SGLang, in addition to patches, the mitigation is to restrict the scope of the brokers and to apply network controls. Amazon, for its part, has expressly recommended that customers with critical loads leave the sandbox mode and move to VPC to achieve isolation, and use DNS filtering solutions as mentioned by AWS.

Finally, this episode recalls that innovation in IA brings new security challenges: dynamic execution, integration with cloud services and flexibility for developers coexist with vectors that attackers can chain. The answer is not to give up these tools, but to manage them with robust security policies, regular permit reviews and a cycle of parking and audit as agile as the development that feeds these platforms. To be informed through the analysis of industry signatures and official notices - such as those linked to this article - is an essential part of this defence.

Coverage

Related

More news on the same subject.